Program



    
Morning Session Time : 2023.9.19 10:00 ~ 10:30
[Keynote Speech 2] Generative AI and Cybersecurity mail share facebook share twitter share linkedin share band share kakao

Microsoft
Shin, Ho Chul Sr. Specialist Manager

With the growing interest in Generative AI, its being utilized across various fields of work. From the perspective of organizational leaders and CISO, concerns regarding information leakage due to the use of Generative AI are also increasing. This presentation will introduce Microsofts strategies for safely harnessing Generative AI, covering considerations for secure usage and approaches to enhance its security posture.


Microsoft

Microsoft Security

Our approach to security is comprehensive as we believe that anything less than comprehensive security is no security at all. We have a unique understanding of today’s security challenges because we live this fight every single day. We secure devices, identities, apps, clouds?the fundamental fabric of our customers’ lives?across security, compliance, identity, endpoint management, and privacy as well as multicloud and multi-platform. Our products are also deeply integrated to provide a simplified and unifying experience. We have a unique outside-in and inside-out approach combined with the power of AI and automation that provides unprecedented visibility and protection, helping customers scale faster and reduce the time between reality and our view on reality. We are the experts that experts go to and we’re allies on their journey. And as we innovate products across all aspects of the customer experience, we’re uniquely positioned to meet the security needs of the future so you can innovate faster and further. After all, we know just how mission critical this work is?and we’re in it together.
Microsoft Security provides the most comprehensive approach to security. Eliminate gaps and get simplified, best-in-breed protection with built-in intelligence so you can be fearless as you innovate and grow in a changing world.
Microsoft Defender and Microsoft Sentinel are our XDR and SIEM solutions. They deliver threat protection for identity, email, data, apps, and more as well as cloud security to protect your workloads in the cloud no matter which platforms you are on and which cloud providers you use.
Microsoft Entra is the new product family name for identity and access solutions from Microsoft.

Our growth vision for identity and access goes beyond traditional identity management to give our customers entire toolset to secure access for everyone to everything in multi-cloud and multi-platform environments. We’re building these capabilities as a trust fabric that can serve the entire digital ecosystem, and Microsoft Entra name encompasses this expanded vision.
Microsoft Purview solutions help customers govern, protect, and manage data across both Microsoft and non-Microsoft assets.
Understanding and governing data is critical for customers to establish the foundation for effective data governance and usage. Once customers discover and map information in their organization, they can then put the right data sharing and usage policies in place.
Now that data has been identified, customers need to ensure it will be secured. Apply sensitivity labels, classify data, and create protection policies to prevent accidental data sharing.
Privacy management has become an important topic among our customers, driven by regulations as well as the expectation of their customers. Microsoft Priva is a new capability we introduced in November 2021 to provide you a set of tools to manage privacy and build a privacy resilient workspace by identifying and remediating privacy risks and automating privacy operations and responses to subject rights requests.
Microsoft Endpoint Manager provides management capabilities critical to effectively protect all your endpoints spanning from Windows to Linux and to macOS. It helps ensure devices are up to date, manage security policies, and implement Zero Trust strategies. Like identity access and management, endpoint management is another foundational block to security. The secure adaptive access mentioned earlier is also enabled by assessing the condition of the endpoint itself ? such as what is status of its hardware and software and which network it is accessing from, before granting access.


Tel : 02-531-4051


Email : sangjp@microsoft.com


Homepage : https://www.microsoft.com/ko-kr/security


Download